• Publications
  • Influence
Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection
TLDR
We apply Long Short Term Memory(LSTM) architecture to a Recurrent Neural Network(RNN) and train the IDS model using KDD Cup 1999 dataset. Expand
Design and implementation of a private and public key crypto processor and its application to a security system
TLDR
In this paper, we have presented the design and implementation of a crypto processor composed of a 32-bit RISC processor and coprocessor blocks dedicated to the AES, KASUMI, SEED, triple-DES, ECC and RSA crypto algorithms. Expand
Efficient Ring-LWE Encryption on 8-Bit AVR Processors
TLDR
In this paper, we introduce a carefully-optimized implementation of a ring-LWE encryption scheme for 8-bit AVR processors like the ATxmega128. Expand
An Effective Intrusion Detection Classifier Using Long Short-Term Memory with Gradient Descent Optimization
TLDR
We find the most suitable optimizer among six optimizes for Long Short-Term Memory Recurrent Neural Network (LSTM RNN) model applied in IDS. Expand
Nonintrusive Load Monitoring Based on Advanced Deep Learning and Novel Signature
TLDR
We proposed state-of-the-art energy disaggregation based on Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) model and additional advanced deep learning. Expand
Attribute-based Proxy Re-encryption with a Constant Number of Pairing Operations
TLDR
We present the attribute-based proxy re-encryption (ABPRE) scheme with constant number of pairing operations. Expand
Applying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization
TLDR
In this paper, we apply recurrent neural network with hessian-free optimization which is one of the deep learning algorithm for intrusion detection. Expand
Compact Implementations of LEA Block Cipher for Low-End Microprocessors
TLDR
In WISA'13, a novel lightweight block cipher named LEA was released. Expand
A More Compact Representation of XTR Cryptosystem
TLDR
We propose a new variant of XTR cryptosystem over finite fields with characteristic three whose compression ratio is 1/6. Expand
Secure IoT framework and 2D architecture for End-To-End security
TLDR
We proposed a secure IoT framework to ensure an End-To-End security from an IoT application to IoT devices. Expand
...
1
2
3
4
5
...